mpm

@tCryptoman

Reverse engineering, Malware analysis.

127.0.0.1
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @tCryptoman

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tCryptoman

  1. proslijedio/la je Tweet
    18. sij

    Happy news! and I got accepted to 🥳 We are going to present "Hide & Seek: The lifecycle of in-memory implants on Android devices" \o/

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    26. pro 2019.

    Any ideas for Masters/Bachelors thesis topics around malware analysis, reverse engineering, low-level security or other infosec topics? Please RT too - I get this question a lot and I always struggle to answer. So I hope to use our community's wisdom and send folks here :)

    Poništi
  4. proslijedio/la je Tweet
    27. pro 2019.

    I blog about writing custom protobuf mutation routines for fuzzing: Happy holidays and happy fuzzing! May you beat randomness with a custom mutation and find that elusive bug :-)

    Poništi
  5. proslijedio/la je Tweet
    27. pro 2019.

    If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)

    Poništi
  6. proslijedio/la je Tweet
    24. pro 2019.

    New XMas release of frida-fuzzer: 1.2 🎉 A release with Android fuzzing in mind. Moar speed for remote (e.g. with adb) and ARM fuzzing and support to dictionaries.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  8. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  9. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  10. proslijedio/la je Tweet
    18. pro 2019.

    A recent result: deobfuscation via relational abstract interpretation

    Poništi
  11. proslijedio/la je Tweet
    19. pro 2019.

    Now that I’m back, I will publish the remaining parts of the iOS exploit chain writeup soon. I will also do writeups on my TrustZone research journey, starting with setting up a research device, followed by RE and TEE internals. It’s time I publish my >100 pages of notes lol

    Poništi
  12. proslijedio/la je Tweet

    For Day 4 of our Top 5 bugs of 2019, details how the duo used a RegExp vuln in the infotainment system to win a Model 3 at this year.

    Poništi
  13. proslijedio/la je Tweet
    18. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Interested in Smart TV hacking but don't know where to start? We've done all the legwork for you on the Samsung Q60 TV by

    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    23. stu 2019.
    Poništi
  17. proslijedio/la je Tweet
    22. stu 2019.

    Introducing the fzero fuzzer! A target-architecture-agnostic grammar-based fuzzer (inspired by F1). With no input size constraints, multi-thread support, and all Rust code for no corruption bugs. 5x faster than the worlds fastest grammar-based fuzzer ;D

    Poništi
  18. proslijedio/la je Tweet
    22. stu 2019.

    Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    22. stu 2019.

    Pro-tip. Ever wonder what a structure _actually_ looks like in memory when it's full of unions, typedefs, etc? The `pahole` command (from the `dwarves` package) can take in an ELF with DWARF symbols and output the structures unrolled recursively. Example:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·